1. The security risk assessment handbook : a complete guide for performing security risk assessments /: a complete guide for performing security risk assessments. (2006) Other Names: Landoll, Douglas J Record Type: Book Extent: 1 online resource (xxi, 473 pages), illustrations, maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Business continuity & disaster recovery for IT professionals. (©2007) Other Names: Snedaker, Susan Record Type: Book Extent: 1 online resource (xxiv, 456 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Security strategy : from requirements to reality /: from requirements to reality. (©2011) Other Names: Stackpole, Bill; Oksendahl, Eric Record Type: Book Extent: 1 online resource (xxiii, 321 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. The cyber risk handbook : creating and measuring effective cybersecurity capabilities /: creating and measuring effective cybersecurity capabilities. (2017) Authors: Antonucci, Domenic Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. The security risk assessment handbook : a complete guide for performing security risk assessments /: a complete guide for performing security risk assessments. (©2011) Other Names: Landoll, Douglas J Record Type: Book Extent: 1 online resource (xix, 475 pages), illustrations, maps View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Information security : design, implementation, measurement, and compliance /: design, implementation, measurement, and compliance. (©2007) Other Names: Layton, Timothy P Record Type: Book Extent: 1 online resource (222 pages) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. The security risk assessment handbook : a complete guide for performing security risk assessments /: a complete guide for performing security risk assessments. (2021) Authors: Landoll, Douglas J Record Type: Book Extent: 1 online resource, illustrations (black and white), maps (black and white) View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Cybersecurity and decision makers : data security and digital trust /: data security and digital trust. (2020) Authors: Fréminville, Marie de Record Type: Book Extent: 1 online resource, illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectives /: securing organizations impaired by employee politics, apathy, and intolerant perspectives. (©2009) Other Names: Collette, Ronald D; Gentile, Michael; Gentile, Skye Record Type: Book Extent: 1 online resource (xxxi, 282 pages), illustrations View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Why don't we defend better? : data breaches, risk management, and public policy /: data breaches, risk management, and public policy. ([2019]) Authors: Sloan, Robert H; Warner, Richard, 1946- Record Type: Book Extent: 1 online resource View Content: Available online (eLD content is only available in our Reading Rooms) ↗